-
Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVM,
The 9th International Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2020), (2020). (accepted)
-
Hiroki Kuzuno, Toshihiro Yamauchi,
MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption,
15th International Workshop on Security (IWSEC 2020), Lecture Notes in Computer Science (LNCS), (9, 2020). (accepted)
- Yuta Imamura, Rintaro Orito, Kritsana Chaikaew, Celia Manardo, Pattara Leelaprute, Masaya Sato, Toshihiro Yamauchi,
"Threat Analysis of Fake Virus Alerts Using WebView Monitor,"
Proceedings of 2019 Seventh International Symposium on Computing and Networking (CANDAR), pp.28-36 (11, 2019).
DOI: 10.1109/CANDAR.2019.00012
- Hiroki Kuzuno, Toshihiro Yamauchi,
"KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism,"
The 15th International Conference on Information Security Practice and Experience (ISPEC 2019), Lecture Notes in Computer Science (LNCS), vol.11879, pp.75-94 (11, 2019).
DOI: 10.1007/978-3-030-34339-2_5
- Masaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi,
"(Short Paper) A Method for Preventing Suspicious Web Access in Android WebView,"
The 14th International Workshop on Security (IWSEC 2019),
Lecture Notes in Computer Science (LNCS), vol.11689, pp.241-250 (8, 2019).
DOI: 10.1007/978-3-030-26834-3_14
Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura and Masaki Hashimoto,
"Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes,"
the 2018 IEEE Conference on Dependable and Secure Computing,
Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2018), pp.172-179, (12, 2018).
DOI: 10.1109/DESEC.2018.8625137
Masao Yamamoto, Kohta Nakashima, Toshihiro Yamauchi, Akira Nagoya, Hideo Taniguchi,
"Acceleration of Analysis Processing on Decentralized Performance Profiling System Using Virtual Machines,"
6th International Workshop on Computer Systems and Architecture (CSA2018),
Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW2018), pp.152-158, (11, 2018).
DOI: 10.1109/CANDARW.2018.00035
Yuya Ban, Toshihiro Yamauchi,
"Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory,"
5th International Workshop on Information and Communication Security (WICS 2018),
Proceedings of 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW), pp.398-404, (11, 2018).
DOI: 10.1109/CANDARW.2018.00080
-
Masaya Sato, Hideo Taniguchi, Toshihiro Yamauchi,
Hiding File Manipulation of Essential Services by System Call Proxy,
7th International Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2018), Lecture Notes on Data Engineering and Communications Technologies, vol.22, pp.853-863 (9, 2018).
DOI: 10.1007/978-3-319-98530-5_76
- Yuta Imamura, Hiroyuki Uekawa, Yasuhiro Ishihara, Masaya Sato, ToshihiroYamauchi,
Web Access Monitoring Mechanism for Android WebView,
Australasian Information Security Conference (AISC 2018),
Proceedings of the Australasian Computer Science Week Multiconference (ACSW'18), Article 1, 8 pages (1, 2018).
DOI: 10.1145/3167918.3167942
(Australasian Information Security Conference (AISC 2018), Best Paper Award)
- Hideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi,
Performance Improvement and Evaluation of Function for Tracing Diffusion of Classified Information on KVM,
4th International Workshop on Information and Communication Security (WICS 2017),
Proceedings of 2017 5th International Symposium on Computing and Networking (CANDAR 2017), pp.463-468, (11, 2017).
DOI: 10.1109/CANDAR.2017.91
- Naoki Kudo, Toshihiro Yamauchi, Thomas H. Austin,
Access Control for Plugins in Cordova-based Hybrid Applications,
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications (AINA-2017), pp.1063-1069, (3, 2017).
DOI: 10.1109/AINA.2017.61 [PDF]
- Yohei Akao, Toshihiro Yamauchi,
KRGuard: Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features,
Proceedings of 2016 International Conference on Information Science and Security (ICISS), pp.22-26 (12, 2016).
DOI: 10.1109/ICISSEC.2016.7885860 [PDF]
- Masaya Sato, Toshihiro Yamauchi, Hideo Taniguchi,
Memory Access Monitoring and Disguising of Process Information to Avoid Attacks to Essential Services,
3rd International Workshop on Information and Communication Security (WICS 2016),
Proceedings of 2016 Fourth International Symposium on Computing and Networking (CANDAR 2016), pp.635-641 (11, 2016).
DOI: 10.1109/CANDAR.2016.89 [PDF]
- Toshihiro Yamauchi, Yuta Ikegami,
HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks,
The 10th International Conference on Network and System Security (NSS 2016),
Lecture Notes in Computer Science (LNCS), Vol.9955, pp.219-234 (9, 2016).
DOI: 10.1007/978-3-319-46298-1_15 [PDF]]
(The 10th International Conference on Network and System Security (NSS 2016), Best Paper Award)
- Toshihiro Yamauchi, Yuta Yamamoto, Kengo Nagai, Tsukasa Matono, Shinji Inamoto, Masaya Ichikawa, Masataka Goto, Hideo Taniguchi,
Plate: Persistent Memory Management for Nonvolatile Main Memory,
Proceedings of 31st ACM Symposium on Applied Computing (SAC 2016), pp.1885-1892 (4, 2016).
DOI: 10.1145/2851613.2851744 [PDF]
- Yuta Ikegami, Toshihiro Yamauchi,
Attacker Investigation System Triggered by Information Leakage,
6th International Conference on E-Service and Knowledge Management (ESKM 2015)
Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.24-27 (7, 2015).
DOI: 10.1109/IIAI-AAI.2015.247 [PDF]
- Yohei Akao, Toshihiro Yamauchi,
Proposal of Kernel Rootkits Detection Method by Monitoring Branches Using Hardware Features,
Proceedings of 2015 IIAI 4th International Congress on Advanced Applied Informatics (AAI 2015), pp.721-722 (7, 2015).
DOI: 10.1109/IIAI-AAI.2015.243 [PDF]
- Shota Fujii, Toshihiro Yamauchi, Hideo Taniguchi,
Design of a Function for Tracing the Diffusion of Classified Information for File Operations with a KVM,
The 2015 International Symposium on Advances in Computing, Communications, Security, and Applications (ACSA 2015), (2, 2015).
[PDF]
- Yuichi Nakamura, Akira Moriguchi, Toshihiro Yamauchi,
CSDA: Rule-based Complex Sensor Data Aggregation System for M2M Gateway,
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU 2015), pp.110-115 (1, 2015).
DOI: 10.1109/ICMU.2015.7061051 [PDF]
- Kota Yoshizaki, Toshihiro Yamauchi,
Malware Detection Method Focusing on Anti-Debugging Functions,
1st International Workshop on Information and Communication Security (WICS'14),
Proceedings of 2014 Second International Symposium on Computing and Networking (CANDAR 2014), pp.563-566 (12, 2014).
DOI: 10.1109/CANDAR.2014.36 [PDF]
- Masaya Sato, Toshihiro Yamauchi,
"Complicating Process Identification by Replacing Process Information for Attack Avoidance,"
The 9th International Workshop on Security (IWSEC2014),
Lecture Notes in Computer Science (LNCS), Vol.8639, pp.33-47 (8, 2014).
DOI: 10.1007/978-3-319-09843-2_3 [PDF]
- Jing Yu, Toshihiro Yamauchi,
Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS,
Fourth International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2013),
Proceedings of 2013 IEEE International Conference on High PerformanceComputing and Communications (HPCC-2013) and 2013 IEEE InternationalConference on Embedded and Ubiquitous Computing (EUC-2013), pp.1628-1633, (11, 2013).
DOI: 10.1109/HPCC.and.EUC.2013.229 [PDF]
- Masaya Sato, Toshihiro Yamauchi,
Secure Log Transfer by Replacing a Library in a Virtual Machine,
8th International Workshop on Security (IWSEC2013),
Lecture Notes in Computer Science (LNCS), vol.8231, pp.1-18 (11, 2013).
DOI: 10.1007/978-3-642-41383-4_1 [PDF]
- Takeshi Sakoda, Toshihiro Yamauchi, Hideo Taniguchi,
Evaluation of Load Balancing in Multicore Processor for AnT,
2nd Workshop on Advances in Data Engineering and Mobile Computing (DEMoC-2013),
Proceedings of the 2013 16th International Conference on Network-Based Information Systems, pp.360-365 (9, 2013).
DOI: 10.1109/NBiS.2013.57 [PDF]
- Nobuto Otsubo, Shinichiro Uemura, Toshihiro Yamauchi, Hideo Taniguchi,
Design and Evaluation of a Diffusion Tracing Function for Classified Information among Multiple Computers,
7th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2013),
Lecture Notes in Electrical Engineering (LNEE), Vol.240, pp.235-242 (5, 2013).
DOI: 10.1007/978-94-007-6738-6_30 [PDF]
- Syunya Sakamoto, Kenji Okuda, Ryo Nakatsuka, Toshihiro Yamauchi,
DroidTrack: Tracking Information Diffusion and Preventing Information Leakage on Android,
7th FTRA International Conference on Multimedia and Ubiquitous Engineering (MUE 2013),
Lecture Notes in Electrical Engineering (LNEE), Vol.240, pp.243-251 (5, 2013).
DOI: 10.1007/978-94-007-6738-6_31 [PDF]
- Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi,
Novel Control Method for Preventing Missed Deadlines in Periodic Scheduling,
Proceedings of the 2012 15th International Conference on Network-Based Information Systems, pp.459-464, (9, 2012).
DOI: 10.1109/NBiS.2012.79 [PDF]
- Toshihiro Yamauchi, Akira Kinoshita, Taisuke Kawahara, Hideo Taniguchi,
Design of an OS Architecture that Simplifies Understanding of Operating System Behavior,
Proceedings of 2012 International Conference on Information Technology and Computer Science (ITCS 2012), pp.51-58 (7, 2012).
[PDF]
- Masaya Sato, Toshihiro Yamauchi,
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss,
2011 International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11),
Lecture Notes in Computer Science (LNCS), Vol.6908, pp.176-190, (8, 2011).
DOI: 10.1007/978-3-642-23300-5_14 [PDF]
- Hideaki Moriyama, Toshihiro Yamauchi, Hideo Taniguchi,
"Control Method of Multiple Services for CMP Based on Continuation Model,"
Proceedings of the 4th International Conference on Interaction Sciences: IT, Human and Digital Content (ICIS 2011), pp.83-89, (8, 2011).
IEEE Xplore [PDF]
- Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi,
A Mechanism that Bounds Execution Performance for Process Group for Mitigating CPU Abuse,
2010 International Conference on Security Technology (SecTech2010),
Communications in Computer and Information Science (CCIS), Vol.122, pp.84-93 (12, 2010).
DOI: 10.1007/978-3-642-17610-4_10 [PDF]
(The Second International Mega-Conference on Future Generation Information Technology (FGIT 2010), Best Paper Award)
- Kenji Yamamoto, Toshihiro Yamauchi,
"Evaluation of Performance of Secure OS using Performance Evaluation Mechanism of LSM-based LSMPMON,"
2010 International Conference on Security Technology (SecTech2010),
Communications in Computer and Information Science (CCIS), Vol.122, pp.57-67 (12, 2010).
DOI: 10.1007/978-3-642-17610-4_7 [PDF]
- Yuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi,
Proposal for Sophisticated Periodic Execution Control in Embedded Systems,
The 2nd International Conference on Advanced Science and Technology (AST2010), (6, 2010)
Lecture Notes in Computer Science (LNCS), Vol.6485, pp.549-563 (12, 2010).
- Yuichi Nakamura, Yoshiki Sameshima, Toshihiro Tabata,
"SEEdit: SELinux Security Policy Configuration System with Higher Level Language,"
Proc. of 23rd Large Installation System Administration Conference (LISA '09), pp.107-117 (11, 2009). [PDF]
- Tatsuya Katakami, Toshihiro Tabata, Hideo Taniguchi,
"I/O Buffer Cache Mechanism Based on the Frequency of File Usage,"
Proc. of the third International Conference on Convergence and hybrid Information Technology (ICCIT2008), pp.76-82 (11, 2008).
DOI: 10.1109/ICCIT.2008.107 [PDF]
- Toshihiro Tabata, Kazuhiro Fukutomi, Hideo Taniguchi,
"Proposal of Instant Synchronous Interprocess Communication,"
Proc. of the third International Conference on Convergence and hybrid Information Technology (ICCIT2008), pp.146-149 (11, 2008).
DOI: 10.1109/ICCIT.2008.106
- Takuto Yamaguchi, Yuichi Nakamura, Toshihiro Tabata,
"Integrated Access Permission: Secure and Simple Policy Description by Integration of File Access Vector Permission,"
Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), pp.40-45 (4, 2008). [PDF]
- Masahiro Uemura, Toshihiro Tabata,
"Design and Evaluation of a Bayesian-filter-based Image Spam Filtering Method,"
Proc. of the 2nd International Conference on Information Security and Assurance (ISA2008), pp.46-51 (4, 2008).
DOI: 10.1109/ISA.2008.84 [PDF]
- Toshihiro Tabata, Hideo Taniguchi,
"A Recyclable Resource Management Method for Fast Process Creation and Reduced Memory Consumption,"
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing IPC-07, pp.194-199, (10, 2007). [PDF]
- Toshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi:
"Controlling CPU Usage for Processes with Execution Resource for Mitigating CPU DoS Attack,"
Proc. of 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007)
(The 2007 International Workshop on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous Computing 2007 (IMIS2007)), pp.141-146, (4, 2007). [PDF]
- Fumiaki Nagano, Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai:
"An Intrusion Detection System which can Restore Altered Data,"
Proc. of 4th International Conference in IT and Applications (ICITA2007), pp.29-34 (1, 2007).
[PDF]
- Toshihiro Tabata Miyuki Kotoge, Kei Saitou, Yoshinari Nomura, Hideo Taniguchi:
"Directory Oriented Buffer Cache Mechanism,"
IPSJ Computer System Symposium, Vol.2006, No.14, pp.53-62 (11, 2006). (in Japanese)
- Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai,
"Actively Modifying Control Flow of Program for Efficient Anormaly Detection,"
10th International Conference on Knowledge-Based & Intelligent Information & Engineering Systems (KES 2006),
Lecture Notes in Computer Science (LNCS), Vol.4252, pp.737-744, (10, 2006) [PDF]
- Takuto Yamaguchi, Yuichi Nakamura, Toshihiro TABATA:
"Proposal of File Access Permission which has both Security and Simplified Configuration,"
PreProc. of the 7th International Workshop on Information Security Applications (WISA2006), pp.151-161 (8, 2006).
- Fumiaki Nagano, Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai:
"An Intrusion Detection System using Alteration of Data,"
Proc. of the IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vol.1, pp.243-248 (4, 2006). [PDF]
- Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai:
"Program Obfuscation Scheme using Random Numbers to Complicate Control Flow,"
Proc. of the First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq`05), pp.916-925,
Lecture Notes in Computer Science (LNCS), Vol.3823, pp.916-925, (12, 2005).
- Toshihiro TABATA, Satoshi Hakomori, Hideo Taniguchi:
"An Abuse Prevention Technique of CPU Time by Using Execution Resource,"
PreProc. of the 6th International Workshop on Information Security
Applications (WISA2005), pp.413-420 (8, 2005).
- Amril Syalim, Toshihiro Tabata, Kouichi Sakurai
"Usage Control Model and Architecture for Data Confidentiality in Database Service Provider,"
Proc. of Indonesia Cryptology and Information Security Conference (INA-CISC) 2005, pp.155-160 (3, 2005). [PDF]
- Yuki KOTEGAWA, Toshihiro TABATA, Kouichi SAKURAI:
"End-User Security Management with Mobile Agents,"
Proc. of the Third International Conference on Information (Info'2004),
International Workshop on Information Assurance and Security,
pp.286-289 (12, 2004). [PDF]
- Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI:
"Some fitting of naive Bayesian spam filtering for Japanese environment,"
PreProc. of Workshop on Information Security Applications (WISA2004), pp.175-183 (8, 2004). [PDF]
- Kohei TATARA, Toshihiro TABATA, Kouichi SAKURAI:
"A Probabilistic Method for Detecting Anomalous Program Behavior,"
PreProc. of Workshop on Information Security Applications (WISA2004), pp.105-115 (8, 2004). [PDF]
- Toshihiro TABATA, Kouichi SAKURAI:
"Design of Intrusion Detection System at User Level with System-call Interposing,"
Proc. of 1st International Conference on E-business and Telecommunication Networks (ICETE2004), Vol.2, pp.263-268 (8, 2004). [PDF]
- Toshihiro TABATA, Hideo TANIGUCHI:
"Proposal and Implementation of Heterogeneous Virtual Storage Coexisted of Single Virtual Storage and Multiple Virtual Storage,"
Proc. of International Conference on Computing, Communications and Control Technologies (CCCT'04), Vol.I, pp.415-420 (8, 2004). [PDF]
- Toshihiro TABATA, Hideo TANIGUCHI:
"A Resource Management Method for Improving Recycling Ratio in Recycling Process Elements,"
The 8th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2004), Vol.V, pp.203-208 (7, 2004). [PDF]
- Katsuya SUEYASU, Toshihiro TABATA, Kouichi SAKURAI:
"On the Security of SELinux with a Simplified Policy,"
Proc. of IASTED International Conference on Communication, Network, and Information Security (CNIS 2003), pp.79-84 (12, 2003). [PDF]
- Kazuhide FUKUSHIMA, Toshihiro TABATA, Kouichi SAKURAI:
"Evaluation of Obfuscation Scheme Focusing on Calling Relationships of Fields and Methods in Metrics,"
Proc. of IASTED International Conference on Communication, Network, and
Information Security (CNIS 2003), pp.108-113 (12, 2003). [PDF]
- Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI:
"Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response,"
Proc. of IASTED International Conference on Communication, Network, and
Information Security (CNIS 2003), pp.214-219 (12, 2003). [PDF]
- Kazuhide FUKUSHIMA, Toshihiro TABATA, Kouichi SAKURAI:
"Proposal and Evaluation of Obfuscation Scheme for Java Source Codes by Partial Destruction of Encapsulation,"
Proc. of International Symposium on Information Science and Electrical Engineering 2003 (ISEE 2003), pp.389-392 (11, 2003). [PDF]
- Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI:
"Preventing Spam Disguised as Error Mail,"
Proc. of International Symposium on Information Science and Electrical Engineering 2003 (ISEE 2003), pp.609-611 (11, 2003). [PDF]
- Yuki KOTEGAWA, Toshihiro TABATA, Kouichi SAKURAI:
"Route Detecting System using Multi-Agent for Mobile Agents,"
Proc. of International Symposium on Information Science and Electrical Engineering 2003 (ISEE 2003), pp.617-620 (11, 2003). [PDF]
- Toshihiro TABATA, Yoshinari NOMURA and Hideo TANIGUCHI:
"Evaluation of Communication Bandwidth Control Mechanism by Regulating Program Execution Speed,"
Proc. of 7th IASTED International Conference on Internet and Multimedia
Systems and Applications (IMSA 2003), pp.14-19 (8, 2003). [PDF]
- Toshihiro Tabata and Hideo Taniguchi:
"Efficient Resource Management for Recycling Process Elements,"
IPSJ Computer System Symposium, IPSJ Symposium Series, Vol.2002, No.18, pp.21-28 (2002). (in Japanese)
- Toshihiro Tabata, Yoshinari Nomura and Hideo Taniguchi:
"Guarantee of Service Processing Time of Process Group for Multimedia Application,"
Proc. of Pan-Yellow-Sea International Workshop on Information Technologies for Network Era (PYIWIT'02), pp.104-111 (2002). [PDF]
- Toshihiro Tabata, Hideo Taniguchi and Kazuo Ushijima:
Implementation and Evaluation of Multiple Processes Control Mechanism for Regulating Program Execution Speed,"
Proc. of International Symposium on Principles of Software Evolution (ISPSE 2000), pp.315-319 (2000). [PDF]
- Toshihiro Tabata and Hideo Taniguchi:
"Proposal and Evaluation of function for Restarting Process,"
IPSJ Computer System Symposium, IPSJ Symposium Series, Vol.2000, No.13, pp.91-98 (2000). (in Japanese)
- Toshihiro Tabata and Hideo Taniguchi:
"Guarantee of Service Processing Time by execution on Tender,"
IPSJ Computer System Symposium, IPSJ Symposium Series, Vol.99, No.16, pp.33-40 (1999). (in Japanese)
- Toshihiro Tabata and Hideo Taniguchi:
"Implementation and Evaluation of Process Execution Mechanism on Tender,"
IPSJ Computer System Symposium, IPSJ Symposium Series, Vol.98, No.15, pp.87-94 (1998). (in Japanese)